39672926-cryptosoft
TRANSCRIPT
-
8/7/2019 39672926-CRYPTOSOFT
1/35
-
8/7/2019 39672926-CRYPTOSOFT
2/35
CONTENTS Problem Definition
Problem Description
Software requirements
Data protection software
Use case diagram
Data Flow Diagram
Applications
Conclusion
-
8/7/2019 39672926-CRYPTOSOFT
3/35
PROBLEM DEFINITION
Main aim
Develop a cryptosystem for ensuring data security
Used to encrypt or decrypt files , folders or even the drives of a computer
system
Scope of the project is not only to meet the needs of an organisation but also
on individual needs
The proposed system achieves the following goals:
Confidentiality: To protect a user's identity or data from being read.
Data integrity: To protect data from being altered.
Authentication: To assure that data ori inates from a articular art .
-
8/7/2019 39672926-CRYPTOSOFT
4/35
PROBLEM DESCRIPTION
Based on cryptography
Implementing cryptographic techniques such as encryption and
description
Two types of cryptographic schemes
1.Secret key (or symmetric) cryptography
2. Public-key (or asymmetric) cryptography.
Algorithms used are DES,Triple DES,Rijandael algorithms for
message encryption & decryption and RSA for key encryption and
decryption
-
8/7/2019 39672926-CRYPTOSOFT
5/35
-
8/7/2019 39672926-CRYPTOSOFT
6/35
WHY CRYPTOSOFT??? Software customizationfacility
Drive Encryptionfacility
Accu
rateoutputis
provided Excellentperformanceforensuringdata security
Helpfultomaintain confidentialdatabases
Simple userinterfaces
Easyimplementation
Low cost hardwarerequirements Userfriendly
Noneedforanymaintanence.
-
8/7/2019 39672926-CRYPTOSOFT
7/35
WHAT IS
CRYPTOGRAPHY??? Cryptography : from the Greek for secret writing
It is the mathematical scrambling of data so that
only someone with the necessary key can unscramble
it.
Secure transmission of private information
Secure storage of sensitive data
-
8/7/2019 39672926-CRYPTOSOFT
8/35
DATA FLOW DIAGRAMS
Level 0 DFD
Crypto
system
PLAIN TEXT CIPHER TEXT
OutputInput
-
8/7/2019 39672926-CRYPTOSOFT
9/35
ENCRYPTION-
TERMINOLOGY
-
8/7/2019 39672926-CRYPTOSOFT
10/35
SYMMETRIC ENCRYPTION &
DECRYPTION
Same algorithm with
same key is used for
encryption &decryption.
Sender & the receiver
must share the
algorithm and the key.
The key must be kept
secret.
-
8/7/2019 39672926-CRYPTOSOFT
11/35
ASYMMETRIC ENCRYPTION AND
DECRYPTION
Sending keys securely
1 algorithm -
encryption &
decryption + a pair
of keys
One of the two keys
must be kept secret.
-
8/7/2019 39672926-CRYPTOSOFT
12/35
COMBINING SYMMETRIC &
ASYMMETRIC ENCRYPTION
Each user should have a pair
of keys (public, private).
Sender encrypt the plaintext
using the receivers public key
and send it to the receiver.
Receiver can decrypt thecipher text with his private
key.
-
8/7/2019 39672926-CRYPTOSOFT
13/35
The proposed software performs the following tasks.
Software Customization
Symmetric Encryption & Decryption
Asymmetric Encryption & Decryption
DATA PROTECTION
SOFTWARE
-
8/7/2019 39672926-CRYPTOSOFT
14/35
Level 1 DFD
( Data Protection Software )
Asymmetric
Decryption
User
Asymmetric
Encryption
Symmetric
Decryption
Symmetric
Encryption
Software
Customizatio
n
CODE NO
-
8/7/2019 39672926-CRYPTOSOFT
15/35
SOFTWARE
CUSTOMIZATION Input a secret code number.
Software performs mathematical calculations and the
result is used to select one of the embeddedcryptographic schemes.
User should use the same customization code for
both encryption & decryption of a document. The sender while sending a cipher text, should
communicate customization code to the receiver.
-
8/7/2019 39672926-CRYPTOSOFT
16/35
Level 1.1 DFD
( Software Customization Module )
User
DES
Algorithm
Triple
DES
Algorithm
Rijndael
Algorithm
RESULT
SELECTION
FLAG
Algorith
m
Selection
Arithmetic
operations
CODE NO
-
8/7/2019 39672926-CRYPTOSOFT
17/35
SYMMETRIC ENCRYPTION
& DECRYPTION The plaintext & the secret key are fed to the algorithm.
The plaintext is divided into blocks of bits.
Each block is again divided and combined with a sub
key and will undergo permutation & substitution
operations to produce the cipher text
The proposed software uses DES , TripleDES &Rijandael algorithms for both encryption & decryption.
-
8/7/2019 39672926-CRYPTOSOFT
18/35
-
8/7/2019 39672926-CRYPTOSOFT
19/35
CALCULATION OF F(R,K)
-
8/7/2019 39672926-CRYPTOSOFT
20/35
S box substitution
-
8/7/2019 39672926-CRYPTOSOFT
21/35
DES,TRIPLE DES AND
RIJANDAEL PARAMETERS
-
8/7/2019 39672926-CRYPTOSOFT
22/35
Level 1.2 DFD
( Symmetric Encryption Module )
User
File
Folder
Drive
DES
Encryption
Algorithm
Triple DES
Encryption
Algorithm
PLAIN TEXT
SYMMETRIC
KEY
PLAIN TEXT CIPHER TEXT
Rijandael
Encryption
Algorithm
Encrypteddocuments
-
8/7/2019 39672926-CRYPTOSOFT
23/35
Level 1.3 DFD
( Symmetric Decryption Module )
User
File
Folder
Drive
DES
Decryption
Algorithm
Triple DES
Decryption
Algorithm
Rijandael
Decryption
Algorithm
CIPHER TEXT
SYMMETRIC
KEY
CIPHER TEXT PLAIN TEXTDecrypteddocuments
-
8/7/2019 39672926-CRYPTOSOFT
24/35
ENCRYPTION AND
DECRYPTION This feature is added for transferring the
symmetric key & customization code securely.
The proposed software uses RSA algorithm forencryption & decryption.
RSA algorithm is based on mathematical
techniques rather than on substitution &permutation.
-
8/7/2019 39672926-CRYPTOSOFT
25/35
Level 1.4 DFD
(A
symmetric Encryption Module )
UserRSA Encryption
AlgorithmEncrypted keys
CIPHER TEXT
PUBLICKEY OFCLIENT
SYMMETRICKEY
& CODE NO
-
8/7/2019 39672926-CRYPTOSOFT
26/35
Level 1.5 DFD
(A
symmetric Decryption Module )
User RSA
Decryption
Algorithm
Decrypted keys
SYMMETRICKEY& CODE NO
CIPHER TEXT
PRIVATE KEY OFCLIENT
-
8/7/2019 39672926-CRYPTOSOFT
27/35
USE CASE DIAGRAMS
-
8/7/2019 39672926-CRYPTOSOFT
28/35
Obtain a number
Repeat the entry
Press the customizebutton
SOFTWARE CUSTOMIZATION
-
8/7/2019 39672926-CRYPTOSOFT
29/35
-
8/7/2019 39672926-CRYPTOSOFT
30/35
Obtain sourcedrive
Obtain destinationdrive
Obtain Password
Press the Encryptbutton
Obtain source file
Obtain destinationfile
Obtain Password
Press the decryptbutton
DRIVE ENCRYPTION &
FILE DECRYPTION
-
8/7/2019 39672926-CRYPTOSOFT
31/35
Obtain source
drive
Obtain destination
drive
Obtain Password
Press the decryptbutton
Obtain sourcefolder
Obtain destinationfolder
Obtain Password
Press the decryptbutton
DRIVE & FOLDER
DECRYPTION
-
8/7/2019 39672926-CRYPTOSOFT
32/35
Obtain publickey
Obtain private
key
Press generate keybutton
Enter the key
Enter thecode
EnterPassword
Obtain thedestination
folder
Press the encrypt
button
KEY SETTINGS & KEY
ENCRYPTION
-
8/7/2019 39672926-CRYPTOSOFT
33/35
Obtain the sourcefile
Obtain thedestination file
EnterPassword
Press the Decryptbutton
KEY DECRYPTION
-
8/7/2019 39672926-CRYPTOSOFT
34/35
CONCLUSION The primary objective of this system is to protect
confidential documents
Cryptography helps to store confidential data of any size DES, Triple DES and Rijndael algorithms are fast and are
well suited for performing cryptographic transformations
on large streams of data.
The implementation and the design will be presented in the
later phases
-
8/7/2019 39672926-CRYPTOSOFT
35/35
Thank you!!!